Skip to main content
All CollectionsFrequently Asked Questions
Privacy, Security, and Content Access Policies
Privacy, Security, and Content Access Policies

How your activity on Magai is handled by Magai as well as 3rd party AI providers.

Dustin W. Stout avatar
Written by Dustin W. Stout
Updated over 6 months ago

At Magai, we are committed to protecting the privacy and security of our users' data. This document outlines our content policies and how they apply to the AI models our users access through our platform.

Data Shared with AI Models

When using Magai's platform, users may share the following types of data with the AI models:

  • Text prompts

  • Images

  • Limited personal information (e.g., name and email address) when creating an account

Third-Party AI Providers

Magai works with various AI model providers to process user content. Users can choose which AI model they want to use, and their request is routed to the corresponding provider. Our AI providers include:

  • OpenAI

  • Anthropic

  • Google (open source)

  • Meta (open source)

  • Mistral (open source)

  • Perplexity

In all cases, Magai has opted out of any data being stored and used by third-party providers to train future models. We have established contractual agreements with these providers that prohibit them from storing or using user data for any purpose other than processing the user's request. We also conduct regular audits to ensure compliance and have implemented technical measures to protect data during transmission.

Data Security and Privacy

Magai takes several measures to ensure the security and privacy of user data:

  • Data is safeguarded in transit with TLS and at rest through RDS AES-256 encryption.

  • Magai's hosting platform is built on AWS, which supports 143 security standards and compliance certifications.

  • Our servers are located in the U.S., and we comply with the SOC 2 Type II standard for security and offer a GDPR-compliant data processing agreement (DPA).

  • We use automated code testing, vulnerability testing (including OWASP Top 10), and continuous monitoring technologies.

  • Bubble, the platform on which Magai is built, conducts annual penetration tests following the comprehensive OWASP WSTG.

For more information about the security features and practices employed by Bubble, please visit their security page.

User Control and Transparency

We believe in giving our users control over their data and being transparent about our data practices. Users can delete their data from our platform at any time, and we ensure that this deletion request is also communicated to the third-party providers.

We regularly update our privacy policy and communicate any changes to our users. If you have any questions or concerns about our content policies or the security of your data, please don't hesitate to contact us.

Access to User Content and Information

At Magai, we understand that the privacy and security of your content and information are of utmost importance. We want to assure you that access to user content and information is strictly limited to essential scenarios and is subject to rigorous controls.

Access by Magai Team Members

Only authorized individuals on the Magai team who have the appropriate clearance and a legitimate need to access user content and information are permitted to do so. These team members have undergone extensive background checks and training to ensure they handle user data with the highest level of confidentiality and integrity.

Magai team members will only access user content and information in the following specific scenarios:

1. User-requested assistance: If a user explicitly requests help with troubleshooting their content or resolving an issue, authorized Magai team members may access the user's content to provide the necessary assistance.

2. Explicit user consent: If a user provides explicit consent for Magai team members to review their content for a specific purpose (e.g., to provide feedback or suggestions), authorized team members may access the user's content in accordance with the given consent.

3. Terms of Service violation investigation: In the event that a user is suspected of violating Magai's Terms of Service, authorized Magai team members may access the user's content as part of an investigation. This access is limited to the scope of the investigation and is subject to strict protocols to ensure the user's rights are protected.

In all other cases, Magai team members are strictly prohibited from accessing user content and information. We maintain detailed access logs to monitor and audit any access to user data, ensuring that it is always in line with our policies and procedures.

Data Confidentiality and Non-Disclosure

All Magai team members are bound by strict confidentiality agreements and are required to maintain the confidentiality of user data at all times. They are prohibited from disclosing any user content or information to unauthorized parties, both within and outside the company.

We have implemented technical and organizational measures to ensure that user data is protected from unauthorized access, use, or disclosure. These measures include access controls, encryption, and regular security training for all team members.

If you have any questions or concerns about how Magai team members access user content and information, please don't hesitate to contact us. We are committed to being transparent about our practices and ensuring that your data is always protected.

Did this answer your question?